Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe
Resource
win10v2004-20241007-en
General
-
Target
16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe
-
Size
281KB
-
MD5
eda57e6bcbb7fd7f40af33f8a0a87080
-
SHA1
d1b0094691231d09c01e227291454d1da159800b
-
SHA256
16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0e
-
SHA512
27c269e6346b4c207be53a0c2afdfe720b0d5e0c19119c62d25f77fcf36306d387f654bdbfe22917660818c07347ee4438afb0f92039cca4935fe1249b2c0804
-
SSDEEP
6144:bpre/V3WApRICD4pz+ZoIQB9SkZsBt1QbVHy0r:bFQVlRIoZMB9SkJVVr
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_HAOG_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_MGES2_.txt
http://hjhqmbxyinislkkt.onion/035B-5A8F-2213-0502-0DF6
http://hjhqmbxyinislkkt.1gu5um.top/035B-5A8F-2213-0502-0DF6
http://hjhqmbxyinislkkt.1w5iy8.top/035B-5A8F-2213-0502-0DF6
http://hjhqmbxyinislkkt.1aajb7.top/035B-5A8F-2213-0502-0DF6
http://hjhqmbxyinislkkt.1nm62r.top/035B-5A8F-2213-0502-0DF6
http://hjhqmbxyinislkkt.1efxa8.top/035B-5A8F-2213-0502-0DF6
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1102) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4308 netsh.exe 4908 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpEAFC.bmp" 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\steam 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\the bat! 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files\ 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\ 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\program files (x86)\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\ 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 452 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 3564 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4768 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 452 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe Token: SeCreatePagefilePrivilege 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe Token: 33 508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 508 AUDIODG.EXE Token: SeDebugPrivilege 3564 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 688 wrote to memory of 4308 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 83 PID 688 wrote to memory of 4308 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 83 PID 688 wrote to memory of 4308 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 83 PID 688 wrote to memory of 4908 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 85 PID 688 wrote to memory of 4908 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 85 PID 688 wrote to memory of 4908 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 85 PID 688 wrote to memory of 2212 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 102 PID 688 wrote to memory of 2212 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 102 PID 688 wrote to memory of 2212 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 102 PID 688 wrote to memory of 4768 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 103 PID 688 wrote to memory of 4768 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 103 PID 688 wrote to memory of 4768 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 103 PID 688 wrote to memory of 4816 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 108 PID 688 wrote to memory of 4816 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 108 PID 688 wrote to memory of 4816 688 16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe 108 PID 4816 wrote to memory of 3564 4816 cmd.exe 110 PID 4816 wrote to memory of 3564 4816 cmd.exe 110 PID 4816 wrote to memory of 3564 4816 cmd.exe 110 PID 4816 wrote to memory of 452 4816 cmd.exe 112 PID 4816 wrote to memory of 452 4816 cmd.exe 112 PID 4816 wrote to memory of 452 4816 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe"C:\Users\Admin\AppData\Local\Temp\16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4308
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THIS_FILE_XBIB44_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THIS_FILE_P3SS0KL_.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "16e2b46f7e3b1214f230a1f0ae584592320dda69f564258007325c832383cb0eN.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:452
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x490 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:508
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD56cd0016d85a59c42dbe49ee3e6a4037f
SHA10a3d6c85e8456b0a90637929b5ef45ed27a00e92
SHA25657a33f12e0da3d707f8581d984f0828676dd3a6e1b2189a74de35dc1defcb677
SHA512e5c0f7aba169f4b823b2662e28498b6f7ac66f7e7ef66bec10e4e76387086446faa5c2440929766af70e7ae2f7e5db12988263c29ab18d18e59da170685f1fdf
-
Filesize
74KB
MD5abb267e7f0d3c2c2a4824595be3eff09
SHA13194c6f0a5f1c787ea5b6397df88a5a516cb7703
SHA2561752ef1b8ecfcd6fe5d3bd6dc4cc0dcc5565773cb0122fd95b74a8c9b61d7ae6
SHA512caf7640d730dc64671c1970230d128818a3dfa138545ea59405aba06f4ad91340169449f4ef8df0d9599fba8f00e9bc283b9bf59ca1ef18d6bff8388f26e38fa
-
Filesize
1KB
MD53c9f634bed68784c43576de547194720
SHA1bebf0229e2c0e193be7502e142d997f787c9fa2b
SHA25692650f53c8bbb53cba11196aea3910d565707cf38f4330483bf4a2ccedd7621b
SHA512ef56ffa7543cfeff78642144823a9277e48aa544f93d4ac20aea420590f69c87efa6495d26d400994375281f25442eea8446755c1d8adff052f6292be65b27c4